Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Password Vulnerability and Security, Part 1

a1sx2_Original1_lockeddownlaptop.jpgA weak password makes identity theft easy for hackers. You would never paint your social security number on the side of a truck and drive around town, but if your password is shared, left out in the open, and used on multiple sites, then you might as well ride shotgun with the Lifelock CEO (his SSN has been stolen 13 times).

As the internet becomes more entwined with our personal and financial lives, the importance of protecting our passwords cannot be understated. Within the last year, hackers have been increasingly aggressive with stealing passwords. 2012 has seen password theft increase 300% from 2010, according to a study by SecurityCoverage. A stolen password does not automatically lead to identity theft, but someone whose data has been compromised is 9.5 times more likely to have their identity stolen.

A hacker can use several different tactics to break into an account, but their preferred strategy is to use stolen passwords. This is because the password and login combination is the only defense between a hacker and your data; which is easier to hack than completely hacking into an entire website from the backend.

There are several tools on the market to strengthen password security beyond the password/login formula. The best password solutions will have features like multi-factor authentication and cloud storage. Password management software allows you to securely keep track of all your different passwords and can be accessed from multiple locations. We will showcase three solid password solutions in part two of our article.

The irony of password management software is that you still need a password to use it. Think of this as a password for your passwords, so make sure you pick a good one! Complexity is the rule of thumb when choosing a secure password, use a combination of letters, numbers, and characters, and use the maximum amount of characters allowed. Many websites have a password strength indicator next to the password text box, be sure make use of this helpful tool.

Do you have a good password that you are using? Share it with everybody in the comments! (Just kidding!) You obviously never want to share your password with strangers, but we would like it if you contributed to the comments any helpful password tips that you know of. Next time we'll talk about a few different tools you can use to manage your passwords.

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Saturday, 10 January 2026

Captcha Image

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200